Analysis
-
max time kernel
48s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
X89vM9vMa.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
X89vM9vMa.exe
Resource
win10v2004-20240508-en
General
-
Target
X89vM9vMa.exe
-
Size
769KB
-
MD5
91f3d54d71a0751d55fc066d7831f356
-
SHA1
990c18b063c78cecfac1ae3d870058e5f1619613
-
SHA256
5b459f91fab604c2630768e0423c7d0004aab701978154e1a1ce8d2460ab945f
-
SHA512
e40818039bc0855b108d4e4cb703a399ccbdb86c1df577b81cb9e7a07fd588a18e31f3d805af01d3d8e37ecc4a87d819641408526b7ae12a13e981d351528551
-
SSDEEP
24576:02L5Lk/HCPg8U/z8pzB8/M3GG+/4/pNLC:0K5QHClU7aEs
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2260 X89vM9vMa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2712 2260 X89vM9vMa.exe 28 PID 2260 wrote to memory of 2712 2260 X89vM9vMa.exe 28 PID 2260 wrote to memory of 2712 2260 X89vM9vMa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\X89vM9vMa.exe"C:\Users\Admin\AppData\Local\Temp\X89vM9vMa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2260 -s 6202⤵PID:2712
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2608
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5a0bd0d1a66e7c7f1d97aedecdafb933f
SHA1dd109ac34beb8289030e4ec0a026297b793f64a3
SHA25679d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36
SHA5122a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50